@Breno in addition to the question above about which releases you're
requesting, I have a new question about section mismatch warnings that
the first patchset introduces:
WARNING: vmlinux.o(.text+0x8): Section mismatch in reference from the
function setup_rfi_flush() to the function .init.text:safe_stack_limit()
The function setup_rfi_flush() references
the function __init safe_stack_limit().
This is often because setup_rfi_flush lacks a __init
annotation or the annotation of safe_stack_limit is wrong.
WARNING: vmlinux.o(.text+0x22250): Section mismatch in reference from the
function setup_rfi_flush() to the function .init.text:memblock_alloc_base()
The function setup_rfi_flush() references
the function __init memblock_alloc_base().
This is often because setup_rfi_flush lacks a __init
annotation or the annotation of memblock_alloc_base is wrong.
The "rfi-flush: Make it possible to call setup_rfi_flush() again" patch
removes the __init__ annotation from setup_rfi_flush() and then the
"rfi-flush: Call setup_rfi_flush() after LPM migration" patch makes it
so that setup_rfi_flush() can be called outside of the initialization
phase. If it is called outside of the initialization phase, it could
call the two __init__ functions mentioned in the warnings above. So,
from what I can tell, these are legitimate warnings. Are you all aware
of these warnings and, if so, have you determined that they're not a
problem?
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1760099
Title:
Additional spectre and meltdown patches
Status in The Ubuntu-power-systems project:
Triaged
Status in linux package in Ubuntu:
Triaged
Status in linux source package in Trusty:
Triaged
Status in linux source package in Xenial:
Triaged
Status in linux source package in Artful:
Triaged
Status in linux source package in Bionic:
Triaged
Bug description:
== Comment: #0 - Breno Leitao - 2018-03-29 08:53:56 ==
Hi Canonical,
There are some additional patches for Spectre and Meltdown that is
required on ppc64el. We would need to have them included on all Ubuntu
kernels.
This is the patch series:
[v2,10/10] powerpc/64s: Wire up cpu_show_spectre_v2() [v2,01/10] powerpc:
Add security feature flags for Spectre/Meltdown
[v2,09/10] powerpc/64s: Wire up cpu_show_spectre_v1() [v2,01/10] powerpc:
Add security feature flags for Spectre/Meltdown
[v2,08/10] powerpc/pseries: Use the security flags in
pseries_setup_rfi_flush() [v2,01/10] powerpc: Add security feature
flags for Spectre/Meltdown
[v2,07/10] powerpc/powernv: Use the security flags in pnv_setup_rfi_flush()
[v2,01/10] powerpc: Add security feature flags for Spectre/Meltdown
[v2,06/10] powerpc/64s: Enhance the information in cpu_show_meltdown()
[v2,01/10] powerpc: Add security feature flags for Spectre/Meltdown
[v2,05/10] powerpc/64s: Move cpu_show_meltdown()[v2,01/10] powerpc:
Add security feature flags for Spectre/Meltdown
[v2,04/10] powerpc/powernv: Set or clear security feature flags
[v2,01/10] powerpc: Add security feature flags for Spectre/Meltdown
[v2,03/10] powerpc/pseries: Set or clear security feature flags
[v2,01/10] powerpc: Add security feature flags for Spectre/Meltdown
[v2,02/10] powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags
[v2,01/10] powerpc: Add security feature flags for Spectre/Meltdown
[v2,01/10] powerpc: Add security feature flags for Spectre/Meltdown
[v2,01/10] powerpc: Add security feature flags for Spectre/Meltdown
http://patchwork.ozlabs.org/project/linuxppc-
dev/list/?series=36012=*
== Comment: #1 - Breno Leitao - 2018-03-29 08:55:48 ==
This is a better formatted patch series list:
[v2,10/10] powerpc/64s: Wire up cpu_show_spectre_v2()
[v2,09/10] powerpc/64s: Wire up cpu_show_spectre_v1()
[v2,08/10] powerpc/pseries: Use the security flags in
pseries_setup_rfi_flush()
[v2,07/10] powerpc/powernv: Use the security flags in pnv_setup_rfi_flus()
[v2,06/10] powerpc/64s: Enhance the information in cpu_show_meltdown()
[v2,05/10] powerpc/64s: Move cpu_show_meltdown()
[v2,04/10] powerpc/powernv: Set or clear security feature flags
[v2,03/10] powerpc/pseries: Set or clear security feature flags
[v2,02/10] powerpc/pseries: Add new H_GET_CPU_CHARACTERISTICS flags
[v2,01/10] powerpc: Add security feature flags for Spectre/Meltdown
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-power-systems/+bug/1760099/+subscriptions
--
Mailing list: